SlideShare a Scribd company logo
The Pan-Canadian Trust Framework
(PCTF) for Self-Sovereign Identity (SSI)
IdentityBook.info special
twitter.com/IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Tim Bouma
Senior Advisor, Digital Identity
Government of Canada
Dave Roberts
Senior Consultant, Digital Identity
Government of Canada
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
08 June 2020
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Canada: Enabling Self-Sovereign Identity
Identity is at the core of most government business processes and is the starting
point for trust and confidence in interactions between people and their
government.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
The Canadian Approach and Policy Framework
● Adoption of the self-sovereign identity model within the Canadian public sector
is still being realized in 2020.
● It is too early to tell how it will change the technological infrastructure or the
institutional infrastructure of Canadian public services.
● This has not been an overnight process but rather, a deliberate, phased, and
incremental approach over the past decade.
● Government of Canada policy outcomes for identity management, developed
long before the emergence of self-sovereign identity, are general enough to
enable the adoption of SSI.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
The Pan-Canadian Trust Framework
The PCTF, in its most current version, supports the acceptance and mutual
recognition of:
● Digital identities of persons and organizations; and
● Digital relationships between persons, between organizations, and between
persons and organizations.
The PCTF is technology-agnostic and is defined in a way that encourages
innovation and participation in the digital ecosystem. It allows for the
interoperability of different platforms, services, architectures, and technologies. It
will facilitate the transition from legacy identity technologies to SSI within the
public sector.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Public Sector Profile: Key Milestones and Next Steps
1. Pan-Canadian Trust Framework Consultation Draft Version 1.1
• PCTF Working Group Consultation Draft was finalized on June 2, 2020
• Posted on GitHub for broader consultation and review (June 2020 to ?)
• Re-starting PCTF WG Weekly Series
• Focus on Thematic Issues (e.g., Digital Relationships, Informed Consent, Unregistered
Organizations)
2. PCTF Assessment Worksheet
• Consolidation all Conformance Criteria for each atomic process (400+ in total)
• Integration of Organization Conformance Criteria (may be a separate worksheet)
• Continued refinement and validation of Conformance Criteria
3. PCTF Assessment and Mutual Recognition
• Continued iteration of PTCF assessment processes into a a formalized program.
• Exploring alignment with other frameworks (eIDAS, Digital Nations, etc.)
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
The PCTF Model
● A Normative Core component that
encapsulates the key concepts of the PCTF;
● A Mutual Recognition component that outlines
the current methodology that is used to assess
and certify actors in the digital ecosystem;
● A Supporting Infrastructure component that
describes the set of operational and technical
policies, rules, and standards that serve as the
primary enablers of a digital ecosystem; and
● A Digital Ecosystem Roles and Information
Flows component that defines the roles and
information flows within the digital ecosystem.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Identity Domains
● A Foundational Identity is an identity that has been established or changed as a result of a foundational
event (e.g., birth, person legal name change, immigration, legal residency, naturalized citizenship, death,
organization legal name registration, organization legal name change, or bankruptcy).
o The Vital Statistics Organizations (VSOs) of the Provinces and Territories;
o The Business Registries of the Provinces and Territories;
o Immigration, Refugees, and Citizenship Canada (IRCC); and
o The Federal Corporate Registry of Corporations Canada.
● A Contextual Identity is an identity that is used for a specific purpose within a specific identity context
(e.g., banking, business permits, health services, drivers licensing, or social media). Depending on the
identity context, a contextual identity may be tied to a foundational identity (e.g., a drivers licence) or
may not be tied to a foundational identity (e.g., a social media profile).
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Digital Representations
Currently, the PCTF recognizes two types of digital representations:
● Digital Identity: An electronic representation of an entity, used exclusively by that
same entity, to access valued services and to carry out transactions with trust and
confidence.
● Digital Relationship: An electronic representation of the relationship of one entity to
another entity.
As the PCTF evolves these digital representations will be extended to include other types
of entities such as digital assets and smart contracts. It is also anticipated that in the future
the PCTF will be used to facilitate the mutual recognition of digital representations
between countries.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Atomic Process Model ● Atomic processes are crucial building
blocks to ensuring the overall integrity of
the digital identity supply chain and
therefore, the integrity of digital services.
● Atomic processes have been defined in a
way that they can be implemented as
modular services and be separately
assessed for certification.
● Once an atomic process has been
certified, it can be relied on or “trusted”
and integrated into other digital
ecosystem platforms.
● This digital ecosystem is intended to
interoperate seamlessly across different
organizations, sectors, and jurisdictions,
and to be interoperable with other trust
frameworks.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Examples of PCTF Atomic Processes
PCTF Assessment Worksheet
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
PCTF Dependencies
The PCTF model recognizes two types of dependencies:
● The first type is those dependencies that exist between atomic processes. Although
each atomic process is functionally discrete, to produce an acceptable output an
atomic process may require the successful prior execution of another atomic process.
○ For example, although Identity Establishment of a person or organization can be
performed independently at any time, it is logically correct to do so only after
Identity Resolution for that person or organization has been achieved.
● The second type is dependencies on external organizations for the provision of
atomic process outputs
○ Examples include: a commercial service provider or a credential authentication
service.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Supporting Infrastructure
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Conveyance of Process Output States
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Digital Ecosystem and Information Flows
● The model makes no assumption
on any asymmetric power
relationship between parties.
● Anyone can be subjects, issuers,
holders, and verifiers, using many
different methods.
● The digital ecosystem roles can be
carried out by many different
entities who perform specific roles
under a variety of labels.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Methods
● Methods encompass the sets of rules that govern such things as data
models, communications protocols, cryptographic algorithms, databases,
distributed ledgers, verifiable data registries, and similar schemes; and
combinations of these.
● Methods also include systems that are isolated or have intermittent
connectivity. Within the context of the digital ecosystem, Methods enable
actors to interact directly or indirectly with one another without either party
being bound to a particular solution or technology.
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Mapping to Existing Roles
Role Examples
Issuer Authoritative Party, Identity Assurance Provider, Identity
Proofing Service Provider, Identity Provider, Credential Assurance
Provider, Credential Provider, Authenticator Provider, Credential
Service Provider, Digital Identity Provider, Delegated Service
Provider
Subject Person, Organization, Device
Holder Digital Identity Owner, Card Holder
Verifier Relying Party, Authentication Service Provider, Digital Identity
Consumer, Delegated Service Provider
Methods Infrastructure Provider, Network Operator
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Mapping to Emerging Technology Stacks
Trust over IP Stack PCTF Model
Layer 4: Governance Frameworks
Normative Core
Mutual Recognition
Layer 3: Credential Exchange Digital Ecosystem Roles
Layer 2: DIDComm
Supporting Infrastructure
Layer 1: DID Registries
SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
Federal Digital ID
Directives
● TB Directive on Identity
Management
Standards
● Standard on Identity and
Credential Assurance
Policies
● TB Policy on
Government Security
Legislation
● Financial Administration
Act
Public Sector Profile
Pan-Canadian Trust
Framework
Guidelines and
Technical Standards
● Guideline of Identity
Assurance, Authentication
Requirements
● CATS, ITSP.030.31
Conformance Criteria
Assessment and
Approval
Prov/Terr Digital ID
Directives
Standards
Policies
Guidelines and
Technical Standards
Conformance Criteria
Legislation
For discussion purposes only
National / International Standards
(national in scope with potential for international)
Legislation , Agreements, Treaties, etc.
(e.g. ISO, OECD, WEF, World Bank, etc.)
National / International Digital ID
Assessment and
Approval
Focus: Program Integrity
● Public Interest: specialized
to needs of Public Sector to
ensure trust and confidence.
● Has been tested and revised
based on AB and BC
assessments
● Version 1.1 now available
Focus: Products & Services
● Private Sector-driven: goal
is to encourage
standardized commercial
products and services.
● Remains to be tested
● Version 1.0 pending.
DIACC
Pan-Canadian Trust
Framework
Other Trust
Frameworks
EIDAS (EU)
TDIF (Australia)
Kantara
● There are multiple
international and
industry specific
trust frameworks
● Participating in
Digital Nations
Thematic Group on
Digital Identity
Alignment
Assessment
PCTF Public Sector Profile Assessments: Conducted to Date
Province of Alberta
• April-August 2018 Initial
Assessment
• September 2018: Letter of
Acceptance Issued
• August 2019: Go-Live on My
Service Canada Account
Province of British Columbia
• August-December 2019 Initial
Assessment
• Q1 2020: Letter of Acceptance
Issued (Jan 2020)
• Q1 2020: Go-Live on My CRA
Login (Feb 2020) My Service
Canada Account (Est.)
Rest of Canada
• 2020-202X (Est.)
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Public Sector Profile of the PCTF: Lessons Learned So Far
1. Requires collaborative team effort with experts on the ground.
• Kick-off involved in-person visit to i) gain direct knowledge of program and ii) establish close working relationship between team
members.
• Regular calls (and videoconferencing) between teams.
• Gathered and compiled evidence using conformance criteria templates submitted for assessment.
• Assessment is a discrete work stream, however tightly coupled to other work streams (technical integration, MOU, agreements etc.)
• Engage legal counsel early in the process, as there will be implications for agreements and authorities.
2. Assessment process is iterative and continuously improving.
• Applying best practices from other frameworks (e.g., security assessment and authorization)
• Development of master spreadsheet to assess evidence against conformance criteria with traceability to policy requirements.
• Evidence collected in separate documents and filed for subsequent analysis, review and audit. Final review results in a Letter of
Acceptance.
3. Next Steps: PCTF is evolving for fit and purpose (we are defining the ‘state of the art’)
• Continue to clarify distinction of responsibilities between departments and jurisdictions. Identifying dependencies with processes in
existing programs (e.g. vital statistics, motor vehicle licensing) and other jurisdictions (e.g., federal immigration).
• Maintain focus of PCTF as a business process integrity framework that complements (not replaces) existing technical interoperability
standards and frameworks (e.g., SAML, Open ID Connect, Verifiable Credentials). PCTF also complements existing assessment processes
or agreements (e.g., Privacy Impact Assessment, Security Assessment and Authorization, SOC2 Trust Principles).
• Ensure PCTF is alignment with global frameworks, World Bank, European Union, Financial Action Task Force (customer due diligence)
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
More Info:
Public Sector Profile of the PCTF is available on GitHub:
https://canada-ca.github.io/PCTF-CCP/
Open Government Licence - Canada:
https://open.canada.ca/en/open-government-licence-canada
Twitter (Tim Bouma):
@trbouma
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
https://www.manning.com/books/self-sovereign-identity and IdentityBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
25
www.IdentityBook.info
@IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/

More Related Content

What's hot

Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
Theo Gravity
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
SSIMeetup
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential Objects
Torsten Lodderstedt
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
Clare Nelson, CISSP, CIPP-E
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
Evernym
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
Torsten Lodderstedt
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
Svetlin Nakov
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
Jim Flynn
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
SSIMeetup
 
OAuth
OAuthOAuth
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
Markus Sabadello
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
SSIMeetup
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
SSIMeetup
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
SSIMeetup
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
SSIMeetup
 
Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
StrategyWorks
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
Torsten Lodderstedt
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
Suraj Singh
 

What's hot (20)

Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
OpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential ObjectsOpenID Connect for W3C Verifiable Credential Objects
OpenID Connect for W3C Verifiable Credential Objects
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
OAuth
OAuthOAuth
OAuth
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Introduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus SabadelloIntroduction to DID Auth for SSI with Markus Sabadello
Introduction to DID Auth for SSI with Markus Sabadello
 
Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 

Similar to The Pan-Canadian Trust Framework (PCTF) for SSI

Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
Floyd DCosta
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
IRJET Journal
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
 
Blockchain and XBRL at the 2017 American Accounting Association presented b...
 Blockchain and XBRL at the  2017 American Accounting Association presented b... Blockchain and XBRL at the  2017 American Accounting Association presented b...
Blockchain and XBRL at the 2017 American Accounting Association presented b...
Workiva
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
Future Agenda
 
GM_12_161.pptx
GM_12_161.pptxGM_12_161.pptx
GM_12_161.pptx
ssuseracd6a2
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
A REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESA REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIES
IRJET Journal
 
Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1
Andrew Coakley
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
Floyd DCosta
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
Paul Trevithick
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
Jisc
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
ForgeRock
 
Federated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilFederated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation Council
Arab Federation for Digital Economy
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
Techdemocracy
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
Farhan Farrukh
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
fEngel
 
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Craig Borysowich
 

Similar to The Pan-Canadian Trust Framework (PCTF) for SSI (20)

Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Comparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable CredentialsComparative Study of Blockchain based Verifiable Credentials
Comparative Study of Blockchain based Verifiable Credentials
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Blockchain and XBRL at the 2017 American Accounting Association presented b...
 Blockchain and XBRL at the  2017 American Accounting Association presented b... Blockchain and XBRL at the  2017 American Accounting Association presented b...
Blockchain and XBRL at the 2017 American Accounting Association presented b...
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
GM_12_161.pptx
GM_12_161.pptxGM_12_161.pptx
GM_12_161.pptx
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
A REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIESA REVIEW ON BLOCKCHAIN BASED CHARITIES
A REVIEW ON BLOCKCHAIN BASED CHARITIES
 
Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1Blockchain final 25112015 v1.1
Blockchain final 25112015 v1.1
 
Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking Blockchain for Digital Transformation in Banking
Blockchain for Digital Transformation in Banking
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
 
Federated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation CouncilFederated e-Identity Management across the Gulf Cooperation Council
Federated e-Identity Management across the Gulf Cooperation Council
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Blockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership EditionBlockchain Bootcamp - Leadership Edition
Blockchain Bootcamp - Leadership Edition
 
Mulin Holstein PKI-strategy
Mulin Holstein PKI-strategyMulin Holstein PKI-strategy
Mulin Holstein PKI-strategy
 
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
Capco Blockchain, Distributed Ledger and Cryptocurrencies keynote to IIROC co...
 

More from SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
SSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
SSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
SSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
SSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
SSIMeetup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
SSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
SSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
SSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
SSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
SSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
SSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
SSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
SSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
SSIMeetup
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
SSIMeetup
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
SSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
SSIMeetup
 

More from SSIMeetup (20)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 

Recently uploaded

办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 

Recently uploaded (20)

办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 

The Pan-Canadian Trust Framework (PCTF) for SSI

  • 1. The Pan-Canadian Trust Framework (PCTF) for Self-Sovereign Identity (SSI) IdentityBook.info special twitter.com/IdentityBookHQ SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/ Tim Bouma Senior Advisor, Digital Identity Government of Canada Dave Roberts Senior Consultant, Digital Identity Government of Canada
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives 08 June 2020
  • 3. https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
  • 4. Canada: Enabling Self-Sovereign Identity Identity is at the core of most government business processes and is the starting point for trust and confidence in interactions between people and their government. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 5. The Canadian Approach and Policy Framework ● Adoption of the self-sovereign identity model within the Canadian public sector is still being realized in 2020. ● It is too early to tell how it will change the technological infrastructure or the institutional infrastructure of Canadian public services. ● This has not been an overnight process but rather, a deliberate, phased, and incremental approach over the past decade. ● Government of Canada policy outcomes for identity management, developed long before the emergence of self-sovereign identity, are general enough to enable the adoption of SSI. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 6. The Pan-Canadian Trust Framework The PCTF, in its most current version, supports the acceptance and mutual recognition of: ● Digital identities of persons and organizations; and ● Digital relationships between persons, between organizations, and between persons and organizations. The PCTF is technology-agnostic and is defined in a way that encourages innovation and participation in the digital ecosystem. It allows for the interoperability of different platforms, services, architectures, and technologies. It will facilitate the transition from legacy identity technologies to SSI within the public sector. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 7. PCTF Public Sector Profile: Key Milestones and Next Steps 1. Pan-Canadian Trust Framework Consultation Draft Version 1.1 • PCTF Working Group Consultation Draft was finalized on June 2, 2020 • Posted on GitHub for broader consultation and review (June 2020 to ?) • Re-starting PCTF WG Weekly Series • Focus on Thematic Issues (e.g., Digital Relationships, Informed Consent, Unregistered Organizations) 2. PCTF Assessment Worksheet • Consolidation all Conformance Criteria for each atomic process (400+ in total) • Integration of Organization Conformance Criteria (may be a separate worksheet) • Continued refinement and validation of Conformance Criteria 3. PCTF Assessment and Mutual Recognition • Continued iteration of PTCF assessment processes into a a formalized program. • Exploring alignment with other frameworks (eIDAS, Digital Nations, etc.) SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 8. The PCTF Model ● A Normative Core component that encapsulates the key concepts of the PCTF; ● A Mutual Recognition component that outlines the current methodology that is used to assess and certify actors in the digital ecosystem; ● A Supporting Infrastructure component that describes the set of operational and technical policies, rules, and standards that serve as the primary enablers of a digital ecosystem; and ● A Digital Ecosystem Roles and Information Flows component that defines the roles and information flows within the digital ecosystem. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 9. PCTF Identity Domains ● A Foundational Identity is an identity that has been established or changed as a result of a foundational event (e.g., birth, person legal name change, immigration, legal residency, naturalized citizenship, death, organization legal name registration, organization legal name change, or bankruptcy). o The Vital Statistics Organizations (VSOs) of the Provinces and Territories; o The Business Registries of the Provinces and Territories; o Immigration, Refugees, and Citizenship Canada (IRCC); and o The Federal Corporate Registry of Corporations Canada. ● A Contextual Identity is an identity that is used for a specific purpose within a specific identity context (e.g., banking, business permits, health services, drivers licensing, or social media). Depending on the identity context, a contextual identity may be tied to a foundational identity (e.g., a drivers licence) or may not be tied to a foundational identity (e.g., a social media profile). SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 10. PCTF Digital Representations Currently, the PCTF recognizes two types of digital representations: ● Digital Identity: An electronic representation of an entity, used exclusively by that same entity, to access valued services and to carry out transactions with trust and confidence. ● Digital Relationship: An electronic representation of the relationship of one entity to another entity. As the PCTF evolves these digital representations will be extended to include other types of entities such as digital assets and smart contracts. It is also anticipated that in the future the PCTF will be used to facilitate the mutual recognition of digital representations between countries. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 11. PCTF Atomic Process Model ● Atomic processes are crucial building blocks to ensuring the overall integrity of the digital identity supply chain and therefore, the integrity of digital services. ● Atomic processes have been defined in a way that they can be implemented as modular services and be separately assessed for certification. ● Once an atomic process has been certified, it can be relied on or “trusted” and integrated into other digital ecosystem platforms. ● This digital ecosystem is intended to interoperate seamlessly across different organizations, sectors, and jurisdictions, and to be interoperable with other trust frameworks. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 12. Examples of PCTF Atomic Processes PCTF Assessment Worksheet SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 13. PCTF Dependencies The PCTF model recognizes two types of dependencies: ● The first type is those dependencies that exist between atomic processes. Although each atomic process is functionally discrete, to produce an acceptable output an atomic process may require the successful prior execution of another atomic process. ○ For example, although Identity Establishment of a person or organization can be performed independently at any time, it is logically correct to do so only after Identity Resolution for that person or organization has been achieved. ● The second type is dependencies on external organizations for the provision of atomic process outputs ○ Examples include: a commercial service provider or a credential authentication service. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 15. Conveyance of Process Output States SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 16. Digital Ecosystem and Information Flows ● The model makes no assumption on any asymmetric power relationship between parties. ● Anyone can be subjects, issuers, holders, and verifiers, using many different methods. ● The digital ecosystem roles can be carried out by many different entities who perform specific roles under a variety of labels. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 17. Methods ● Methods encompass the sets of rules that govern such things as data models, communications protocols, cryptographic algorithms, databases, distributed ledgers, verifiable data registries, and similar schemes; and combinations of these. ● Methods also include systems that are isolated or have intermittent connectivity. Within the context of the digital ecosystem, Methods enable actors to interact directly or indirectly with one another without either party being bound to a particular solution or technology. SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 18. Mapping to Existing Roles Role Examples Issuer Authoritative Party, Identity Assurance Provider, Identity Proofing Service Provider, Identity Provider, Credential Assurance Provider, Credential Provider, Authenticator Provider, Credential Service Provider, Digital Identity Provider, Delegated Service Provider Subject Person, Organization, Device Holder Digital Identity Owner, Card Holder Verifier Relying Party, Authentication Service Provider, Digital Identity Consumer, Delegated Service Provider Methods Infrastructure Provider, Network Operator SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 19. Mapping to Emerging Technology Stacks Trust over IP Stack PCTF Model Layer 4: Governance Frameworks Normative Core Mutual Recognition Layer 3: Credential Exchange Digital Ecosystem Roles Layer 2: DIDComm Supporting Infrastructure Layer 1: DID Registries SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/
  • 20. Federal Digital ID Directives ● TB Directive on Identity Management Standards ● Standard on Identity and Credential Assurance Policies ● TB Policy on Government Security Legislation ● Financial Administration Act Public Sector Profile Pan-Canadian Trust Framework Guidelines and Technical Standards ● Guideline of Identity Assurance, Authentication Requirements ● CATS, ITSP.030.31 Conformance Criteria Assessment and Approval Prov/Terr Digital ID Directives Standards Policies Guidelines and Technical Standards Conformance Criteria Legislation For discussion purposes only National / International Standards (national in scope with potential for international) Legislation , Agreements, Treaties, etc. (e.g. ISO, OECD, WEF, World Bank, etc.) National / International Digital ID Assessment and Approval Focus: Program Integrity ● Public Interest: specialized to needs of Public Sector to ensure trust and confidence. ● Has been tested and revised based on AB and BC assessments ● Version 1.1 now available Focus: Products & Services ● Private Sector-driven: goal is to encourage standardized commercial products and services. ● Remains to be tested ● Version 1.0 pending. DIACC Pan-Canadian Trust Framework Other Trust Frameworks EIDAS (EU) TDIF (Australia) Kantara ● There are multiple international and industry specific trust frameworks ● Participating in Digital Nations Thematic Group on Digital Identity Alignment Assessment
  • 21. PCTF Public Sector Profile Assessments: Conducted to Date Province of Alberta • April-August 2018 Initial Assessment • September 2018: Letter of Acceptance Issued • August 2019: Go-Live on My Service Canada Account Province of British Columbia • August-December 2019 Initial Assessment • Q1 2020: Letter of Acceptance Issued (Jan 2020) • Q1 2020: Go-Live on My CRA Login (Feb 2020) My Service Canada Account (Est.) Rest of Canada • 2020-202X (Est.) SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 22. Public Sector Profile of the PCTF: Lessons Learned So Far 1. Requires collaborative team effort with experts on the ground. • Kick-off involved in-person visit to i) gain direct knowledge of program and ii) establish close working relationship between team members. • Regular calls (and videoconferencing) between teams. • Gathered and compiled evidence using conformance criteria templates submitted for assessment. • Assessment is a discrete work stream, however tightly coupled to other work streams (technical integration, MOU, agreements etc.) • Engage legal counsel early in the process, as there will be implications for agreements and authorities. 2. Assessment process is iterative and continuously improving. • Applying best practices from other frameworks (e.g., security assessment and authorization) • Development of master spreadsheet to assess evidence against conformance criteria with traceability to policy requirements. • Evidence collected in separate documents and filed for subsequent analysis, review and audit. Final review results in a Letter of Acceptance. 3. Next Steps: PCTF is evolving for fit and purpose (we are defining the ‘state of the art’) • Continue to clarify distinction of responsibilities between departments and jurisdictions. Identifying dependencies with processes in existing programs (e.g. vital statistics, motor vehicle licensing) and other jurisdictions (e.g., federal immigration). • Maintain focus of PCTF as a business process integrity framework that complements (not replaces) existing technical interoperability standards and frameworks (e.g., SAML, Open ID Connect, Verifiable Credentials). PCTF also complements existing assessment processes or agreements (e.g., Privacy Impact Assessment, Security Assessment and Authorization, SOC2 Trust Principles). • Ensure PCTF is alignment with global frameworks, World Bank, European Union, Financial Action Task Force (customer due diligence) SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 23. More Info: Public Sector Profile of the PCTF is available on GitHub: https://canada-ca.github.io/PCTF-CCP/ Open Government Licence - Canada: https://open.canada.ca/en/open-government-licence-canada Twitter (Tim Bouma): @trbouma SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
  • 24. https://www.manning.com/books/self-sovereign-identity and IdentityBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org